Reducing your work load, one post at a time.
At Countercept, we love to share. Whether it’s sharing our latest code for decompiling malware, demystifying the latest news on cyber security, or our best practice for business enablement and minimizing organizational risk, you’ll find it here.
Threat Hunting For Fileless Malware
'Fileless' attack techniques have been used in the wild for years, yet due to the low detection rates from traditional security mechanisms its popularity appears to be increasing. In this article we take a look at these techniques and how to hunt for them.
Riddle me this: Detecting indirect attacks
Recent news concerning the China-based group APT10 has brought the issue of securing supply chains to the fore - but do you know if you can detect attacks that are not targeted, in the first instance, at yourselves directly?
Machine Learning: A Threat-Hunting Reality Check (Whitepaper)
This paper gives an introduction to the high-level concepts of machine learning and the typical ways in which it is applied to attack detection in the cyber security industry.
Cyber attacks - What are the financial impacts?
In this blog we look at what the key motivations are for attacks and what financial impacts this has on businesses to help draw a more measurable picture of the cyber risks that your business faces
SIEM & Cyber Security Investments
So what if your gym buddy was a professional athlete? This is the benefit of a managed solution; security of enterprise networks is fundamentally the responsibility of the business, but why not take advantage of the expertise of professional threat hunters, who, like athletes, have cutting edge knowledge at their disposal?
Memory Analysis (Whitepaper)
Linux-Targeted KillDisk Discovered
Linux is a commonly used operating system on servers within large enterprises, especially in the financial sector, but now a variant of the KillDisk malware that was used in attacks against Ukraine in late 2015 and late 2016 has been discovered targeting Linux...